Linux Memory tools are a set of Linux tools (Python, C and ASM) which aim is to facilitate exploit development. These tools can be used to dump process memory, search for patterns and quickly find OPCODEs location addresses (instructions and mnemonics are functional but still in development). OPCODE search is possible on an instant memory snapshot or using a file dump. These tools are been quickly coded and should be considered as helpful scripts. Return addresses or shellcode locations can be found instantly.
b563de74e1cda35f782a23fd14e98e36f0b0c04030335f5778d239a1c883e3e3
The Bluetooth stack on Nokia N70 cellular phones is susceptible to a remote denial of service attack.
88e56cf63c296d16b4bfd3dbb4bd7d0257aec42cb75ca655864e91235890c7c1
Proof of concept exploit that resets Sony/Ericsson phones via a flaw in Bluetooth.
69cb4697fe7ae13e375c9aafe468cf4269b76c5f26cdea0ba16392f54d714f4c
BSS (Bluetooth Stack Smasher) is a L2CAP layer fuzzer designed to assess the security of Bluetooth enabled devices by sending malicious packets.
aaba600425bcd01257183c65b4aa46278664ad27a4f671b325327a8cabb77e48
DNSA is an auditing tool which aim is to provide a simple way to pentest DNS servers and perform DNS ID Spoofing.
4492a671fe86808e05422ce270c84c0983ef784b014d88e98e3aee15d5a64ca2
DNS Auditor is a tool which checks for DNS security. Looks for DNS cache poisoning (using additional RR), DNS ID Spoofing, and more. More information in a related paper is available here.
832c63102968839f32aa3a17a7cc29f67bb699940862db19e43e1130efd01dc4